[tor-bugs] #8093 [Tor]: Jan 29 23:32:20.066 [Warning] Bug/attack: unexpected sendme cell from client. Closing circ.

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Jan 30 15:55:28 UTC 2013


#8093: Jan 29 23:32:20.066 [Warning] Bug/attack: unexpected sendme cell from
client. Closing circ.
----------------------+-----------------------------------------------------
 Reporter:  Gravitas  |          Owner:                    
     Type:  defect    |         Status:  new               
 Priority:  normal    |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor       |        Version:  Tor: 0.2.4.9-alpha
 Keywords:            |         Parent:                    
   Points:            |   Actualpoints:                    
----------------------+-----------------------------------------------------

Comment(by Gravitas):

 Interesting: I am now running PeerBlock v1.1 on my Windows server, and the
 frequency of these errors has dramatically dropped. This is the complete
 log after running Tor for 3.5 hours (normally, I would expect a warning
 every minute or so):

 ---start log---
 Jan 30 12:12:29.789 [Notice] Tor v0.2.4.9-alpha (git-23dd7c901287d7d8)
 running on Windows Vista [server] with Libevent 2.0.21-stable and OpenSSL
 1.0.1c.
 Jan 30 12:12:29.789 [Notice] Tor can't help you if you use it wrong! Learn
 how to be safe at https://www.torproject.org/download/download#warning
 Jan 30 12:12:29.789 [Notice] This version is not a stable Tor release.
 Expect more bugs than usual.
 Jan 30 12:12:30.008 [Notice] Read configuration file
 "C:\Users\Administrator\AppData\Local\Vidalia\torrc".
 Jan 30 12:12:30.226 [Notice] Opening Socks listener on 127.0.0.1:9050
 Jan 30 12:12:30.226 [Notice] Opening Control listener on 127.0.0.1:9051
 Jan 30 12:12:30.226 [Notice] Opening OR listener on 0.0.0.0:443
 Jan 30 12:12:30.226 [Notice] Opening Directory listener on 0.0.0.0:9030
 Jan 30 12:12:55.701 [Notice] Parsing GEOIP IPv4 file
 C:\Users\Administrator\AppData\Roaming\tor\geoip.
 Jan 30 12:12:55.701 [Notice] Your Tor server's identity key fingerprint is
 'programmercpp C3627DBECAF75618817C27DFB65DBF0C4CA52FA7'
 Jan 30 12:12:55.701 [Notice] We now have enough directory information to
 build circuits.
 Jan 30 12:12:55.701 [Notice] Bootstrapped 80%: Connecting to the Tor
 network.
 Jan 30 12:12:55.701 [Notice] New control connection opened.
 Jan 30 12:12:57.074 [Notice] Bootstrapped 85%: Finishing handshake with
 first hop.
 Jan 30 12:12:57.604 [Notice] Bootstrapped 90%: Establishing a Tor circuit.
 Jan 30 12:12:57.713 [Warning] Your Guard
 OnionSoup=08D22679377C9EF701193C1F199D9B0B3F1AEE3C is failing a very large
 amount of circuits. Most likely this means the Tor network is overloaded,
 but it could also mean an attack against you or the potentially the guard
 itself. Success counts are 71/154. 71 circuits completed, 0 were unusable,
 0 collapsed, and 0 timed out. For reference, your timeout cutoff is 60
 seconds.
 Jan 30 12:13:00.194 [Notice] Tor has successfully opened a circuit. Looks
 like client functionality is working.
 Jan 30 12:13:00.194 [Notice] Bootstrapped 100%: Done.
 Jan 30 12:13:00.194 [Notice] Now checking whether ORPort
 213.171.220.40:443 and DirPort 213.171.220.40:9030 are reachable... (this
 may take up to 20 minutes -- look for log messages indicating success)
 Jan 30 12:13:08.571 [Notice] Self-testing indicates your ORPort is
 reachable from the outside. Excellent. Publishing server descriptor.
 Jan 30 12:13:09.382 [Notice] Self-testing indicates your DirPort is
 reachable from the outside. Excellent.
 Jan 30 12:17:07.033 [Notice] Performing bandwidth self-test...done.
 Jan 30 13:34:24.725 [Warning] Bug/attack: unexpected sendme cell from
 client. Closing circ.
 Jan 30 13:41:00.841 [Warning] Bug/attack: unexpected sendme cell from
 client. Closing circ.
 ---end log as of Jan 30 15:55:00.00--

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8093#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list